摘要 |
Systems and methods for storing, managing, and accessing confidential data are described. In one aspect of the inventive subject matter, an authentication protocol includes the steps of capturing a user's biometric data, creating a plurality of templates from the biometric data, transforming a set of authentication data using the template, and determining an authentication status of the user based on the transformed authentication data.
|